Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Ref 0180066743.xlsx
|
CDFV2 Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
|
ISO-8859 text
|
dropped
|
||
C:\Users\user\AppData\Roaming\win33.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\~$Ref 0180066743.xlsx
|
data
|
dropped
|
||
C:\Users\Public\vbc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1717583E.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\17662F27.png
|
PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6A2B8E08.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\707074AB.png
|
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\81C8EEFC.png
|
PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\86ABDEF1.png
|
PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87A50956.png
|
PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D956669.png
|
PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CEC1BA6A.png
|
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E476B363.png
|
PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E8E50EB0.png
|
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF6436D2.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD088ACD.png
|
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FFD606D5.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\vbc.exe
|
'C:\Users\Public\vbc.exe'
|
||
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
C:\Users\user\AppData\Local\Temp\RegAsm.exe
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wekeepworking.sytes.net
|
|||
http://198.12.127.155/new.exe
|
198.12.127.155
|
||
wekeepworking12.sytes.net
|
|||
http://www.%s.comPA
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.day.com/dam/1.0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wekeepworking.sytes.net
|
79.134.225.90
|
||
wekeepworking12.sytes.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
79.134.225.90
|
wekeepworking.sytes.net
|
Switzerland
|
||
198.12.127.155
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Users\Public\vbc.exe
|
Shell
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
nz6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EEE36
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
FontCachePath
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DefaultSheetR2L
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
UseSystemSeparators
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ThousandsSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DecimalSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1h6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F3E19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F4A2A
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EXCELFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F3E19
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
There are 52 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3526000
|
unkown
|
page read and write
|
||
32B1000
|
unkown
|
page read and write
|
||
DF2000
|
unkown image
|
page execute read
|
||
DF2000
|
unkown image
|
page execute read
|
||
2A21000
|
unkown
|
page read and write
|
||
3B49000
|
unkown
|
page read and write
|
||
22B1000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
3395000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
3F6000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
2365000
|
unkown
|
page read and write
|
||
DDE000
|
unkown
|
page read and write | page guard
|
||
330000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page read and write
|
||
25F4000
|
heap private
|
page read and write
|
||
366000
|
heap private
|
page read and write
|
||
51CF000
|
unkown
|
page read and write
|
||
3C0000
|
unkown image
|
page readonly
|
||
AB9000
|
heap private
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
25EC000
|
unkown
|
page read and write
|
||
4B5E000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
2367000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
302F000
|
unkown
|
page read and write
|
||
E06000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
442E000
|
unkown
|
page read and write
|
||
380000
|
heap default
|
page read and write
|
||
2D0A000
|
unkown
|
page read and write
|
||
AD6000
|
heap private
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
5B6D000
|
unkown
|
page read and write
|
||
1FD000
|
unkown
|
page read and write
|
||
3DD6000
|
unkown
|
page read and write
|
||
2340000
|
unkown
|
page read and write
|
||
194000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
A40000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
22FC000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
3CE000
|
unkown image
|
page readonly
|
||
660000
|
unkown
|
page read and write
|
||
235F000
|
unkown
|
page read and write
|
||
4A10000
|
unkown
|
page read and write
|
||
2344000
|
unkown
|
page read and write
|
||
88B000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
E30000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
CD0000
|
unkown
|
page execute and read and write
|
||
3DB6000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
42C0000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
4950000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
3CF6000
|
unkown
|
page read and write
|
||
85B000
|
heap default
|
page read and write
|
||
ECE000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
5A6000
|
unkown
|
page read and write
|
||
3C0000
|
unkown image
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
C14000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
1F6000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
49D000
|
heap default
|
page read and write
|
||
1C2000
|
unkown
|
page read and write
|
||
E08000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
548F000
|
unkown
|
page read and write
|
||
E80000
|
unkown
|
page read and write
|
||
C30000
|
heap private
|
page execute and read and write
|
||
C0000
|
unkown
|
page read and write
|
||
7D4000
|
heap default
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
E20000
|
unkown
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
D64000
|
heap private
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
5F7E000
|
unkown
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
87E000
|
heap default
|
page read and write
|
||
234C000
|
unkown
|
page read and write
|
||
889000
|
unkown
|
page read and write
|
||
3C2000
|
unkown image
|
page execute read
|
||
590000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
2AD1000
|
unkown
|
page read and write
|
||
4320000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
91D000
|
unkown
|
page read and write
|
||
6E9000
|
unkown
|
page read and write
|
||
47E0000
|
unkown
|
page read and write
|
||
61EC000
|
unkown
|
page read and write
|
||
2B38000
|
unkown
|
page read and write
|
||
5DAE000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
310000
|
heap private
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
2348000
|
unkown
|
page read and write
|
||
6E0000
|
unkown image
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
668000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
5D8000
|
unkown
|
page read and write
|
||
E40000
|
heap private
|
page execute and read and write
|
||
19D000
|
unkown
|
page execute and read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
1FA000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
AAE000
|
unkown
|
page read and write
|
||
42D0000
|
unkown
|
page read and write
|
||
3DF6000
|
unkown
|
page read and write
|
||
5960000
|
heap private
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
886000
|
unkown
|
page read and write
|
||
234E000
|
unkown
|
page read and write
|
||
3E36000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
227000
|
unkown
|
page read and write
|
||
19B000
|
unkown
|
page execute and read and write
|
||
5419000
|
unkown
|
page read and write
|
||
49F0000
|
unkown
|
page read and write
|
||
210000
|
heap private
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
4990000
|
unkown
|
page read and write
|
||
3D76000
|
unkown
|
page read and write
|
||
3CB6000
|
unkown
|
page read and write
|
||
1C6000
|
unkown
|
page execute and read and write
|
||
DDF000
|
unkown
|
page read and write
|
||
3A69000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
3C0000
|
unkown image
|
page readonly
|
||
1E0000
|
unkown
|
page read and write
|
||
5A5000
|
unkown
|
page read and write
|
||
4476000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
5419000
|
unkown
|
page read and write
|
||
457000
|
heap default
|
page read and write
|
||
5C00000
|
heap private
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
4E40000
|
unkown
|
page write copy
|
||
B0000
|
unkown image
|
page readonly
|
||
CC0000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
603000
|
heap default
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
4C4E000
|
unkown
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
1DB000
|
unkown
|
page execute and read and write
|
||
886000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
236B000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
7ED000
|
heap default
|
page read and write
|
||
50EF000
|
unkown
|
page read and write
|
||
4300000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
4A8E000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
42F0000
|
unkown
|
page read and write
|
||
577C000
|
unkown
|
page read and write
|
||
2D78000
|
unkown
|
page read and write
|
||
49E0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
4ACC000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
684E000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
88B000
|
unkown
|
page read and write
|
||
BFD000
|
unkown
|
page read and write
|
||
AF8000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
DF0000
|
unkown image
|
page readonly
|
||
E10000
|
unkown
|
page read and write
|
||
53FF000
|
unkown
|
page read and write
|
||
474000
|
heap default
|
page read and write
|
||
E15000
|
unkown
|
page read and write
|
||
D60000
|
heap private
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
49A0000
|
heap private
|
page execute and read and write
|
||
630E000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
E00000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
3C0000
|
unkown image
|
page readonly
|
||
1F9000
|
unkown
|
page read and write
|
||
4430000
|
unkown
|
page readonly
|
||
3A0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
4B60000
|
unkown
|
page readonly
|
||
3F0000
|
unkown
|
page read and write
|
||
3A89000
|
unkown
|
page read and write
|
||
3CE000
|
unkown image
|
page readonly
|
||
66C000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
4980000
|
unkown
|
page read and write
|
||
5590000
|
heap private
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page execute and read and write
|
||
170000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
5418000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page read and write
|
||
5416000
|
unkown
|
page read and write
|
||
12D000
|
unkown
|
page execute and read and write
|
||
558E000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
E07000
|
unkown
|
page read and write
|
||
192000
|
unkown
|
page read and write
|
||
889000
|
unkown
|
page read and write
|
||
5408000
|
unkown
|
page read and write
|
||
A6F000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page read and write
|
||
4960000
|
unkown
|
page read and write
|
||
718000
|
unkown
|
page read and write
|
||
3F8000
|
unkown
|
page read and write
|
||
DD0000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
A9E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
E30000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page read and write
|
||
886000
|
unkown
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
7E8000
|
heap default
|
page read and write
|
||
432E000
|
unkown
|
page read and write
|
||
317000
|
heap private
|
page read and write
|
||
2363000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
81D000
|
heap default
|
page read and write
|
||
88A000
|
unkown
|
page read and write
|
||
3CE000
|
unkown image
|
page readonly
|
||
490000
|
unkown
|
page read and write
|
||
42B0000
|
unkown
|
page read and write
|
||
4940000
|
unkown
|
page read and write
|
||
886000
|
unkown
|
page read and write
|
||
5404000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page read and write
|
||
335000
|
heap private
|
page read and write
|
||
4FEE000
|
unkown
|
page read and write
|
||
DA0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
886000
|
unkown
|
page read and write
|
||
50F0000
|
unkown
|
page readonly
|
||
2460000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
D50000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
6310000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page read and write
|
||
C09000
|
unkown
|
page read and write
|
||
3C96000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page execute and read and write
|
||
4F20000
|
unkown
|
page readonly
|
||
426000
|
unkown
|
page read and write
|
||
5406000
|
unkown
|
page read and write
|
||
6F3000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
422000
|
unkown
|
page execute and read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
56AF000
|
unkown
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
8D0000
|
unkown
|
page read and write
|
||
888000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page read and write
|
||
C0D000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
2332000
|
unkown
|
page read and write
|
||
7B0000
|
heap default
|
page read and write
|
||
6AE000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page write copy
|
||
897000
|
unkown
|
page read and write
|
||
888000
|
unkown
|
page read and write
|
||
59EC000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
4810000
|
unkown
|
page read and write
|
||
390000
|
heap private
|
page read and write
|
||
889000
|
unkown
|
page read and write
|
||
E06000
|
unkown
|
page read and write
|
||
96E000
|
unkown
|
page read and write
|
||
DF0000
|
unkown image
|
page readonly
|
||
200000
|
unkown
|
page read and write
|
||
613000
|
heap default
|
page read and write
|
||
4C50000
|
unkown
|
page readonly
|
||
51CE000
|
unkown
|
page read and write | page guard
|
||
3F0000
|
unkown
|
page read and write
|
||
88A000
|
unkown
|
page read and write
|
||
3CE000
|
unkown image
|
page readonly
|
||
C6E000
|
unkown
|
page read and write
|
||
C70000
|
heap private
|
page execute and read and write
|
||
5419000
|
unkown
|
page read and write
|
||
3C2000
|
unkown image
|
page execute read
|
||
5404000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
2612000
|
heap private
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
AB0000
|
heap private
|
page read and write
|
||
1A0000
|
heap private
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
88A000
|
unkown
|
page read and write
|
||
D50000
|
unkown
|
page read and write
|
||
4920000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
193000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
C20000
|
unkown
|
page read and write
|
||
33E000
|
unkown
|
page read and write
|
||
88B000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
7B7000
|
heap default
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
124000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
4700000
|
unkown
|
page readonly
|
||
1BD000
|
unkown
|
page execute and read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page read and write
|
||
886000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
123000
|
unkown
|
page execute and read and write
|
||
325000
|
unkown
|
page read and write
|
||
58FE000
|
unkown
|
page read and write
|
||
5413000
|
unkown
|
page read and write
|
||
3D96000
|
unkown
|
page read and write
|
||
5B5000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
6F2000
|
unkown
|
page read and write
|
||
2346000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
5D4D000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
4B0000
|
heap default
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
88B000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
5400000
|
unkown
|
page read and write
|
||
1D2000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
50AE000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
E12000
|
unkown
|
page read and write
|
||
53D0000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
E20000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
5C5000
|
unkown
|
page read and write
|
||
D82000
|
heap private
|
page read and write
|
||
6B0000
|
unkown
|
page read and write
|
||
DB0000
|
unkown
|
page read and write
|
||
2342000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
E96000
|
unkown image
|
page readonly
|
||
42B0000
|
unkown
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
49A000
|
heap default
|
page read and write
|
||
D50000
|
unkown
|
page read and write
|
||
4930000
|
unkown
|
page read and write
|
||
553D000
|
unkown
|
page read and write
|
||
4AD000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
2630000
|
unkown
|
page readonly
|
||
521E000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
3C2000
|
unkown image
|
page execute read
|
||
E96000
|
unkown image
|
page readonly
|
||
8D0000
|
unkown
|
page read and write
|
||
920000
|
heap private
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
55FF000
|
unkown
|
page read and write
|
||
16B000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
588D000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
DF0000
|
unkown image
|
page readonly
|
||
CAE000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
5DEE000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
C00000
|
unkown
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
AE0000
|
unkown
|
page readonly
|
||
5B0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
4310000
|
unkown
|
page read and write
|
||
4800000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page read and write
|
||
88B000
|
unkown
|
page read and write
|
||
AA0000
|
heap private
|
page execute and read and write
|
||
420000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
3C0000
|
unkown image
|
page readonly
|
||
E16000
|
unkown
|
page read and write
|
||
6E6000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
187000
|
unkown
|
page execute and read and write
|
||
65CD000
|
unkown
|
page read and write
|
||
235D000
|
unkown
|
page read and write
|
||
18A000
|
unkown
|
page execute and read and write
|
||
700000
|
heap private
|
page execute and read and write
|
||
DC4000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
3CD6000
|
unkown
|
page read and write
|
||
3A0000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
2361000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
2E5000
|
unkown
|
page read and write
|
||
350000
|
unkown
|
page execute and read and write
|
||
491F000
|
unkown
|
page read and write
|
||
443000
|
unkown
|
page read and write
|
||
10A000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
5419000
|
unkown
|
page read and write
|
||
6160000
|
heap private
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
2369000
|
unkown
|
page read and write
|
||
340000
|
unkown
|
page read and write
|
||
436000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
DD0000
|
unkown
|
page read and write
|
||
3C2000
|
unkown image
|
page execute read
|
||
234A000
|
unkown
|
page read and write
|
||
17D000
|
unkown
|
page execute and read and write
|
||
3A21000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
1060000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
6E0000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
22E3000
|
unkown
|
page read and write
|
||
6F6000
|
unkown
|
page read and write
|
||
2480000
|
unkown
|
page read and write
|
||
5E0000
|
heap default
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
5407000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
5B0000
|
unkown
|
page read and write
|
||
70E000
|
unkown
|
page read and write
|
||
6F0000
|
unkown
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
42E0000
|
unkown
|
page read and write
|
||
1F6000
|
unkown
|
page read and write
|
||
237C000
|
unkown
|
page read and write
|
||
25F0000
|
heap private
|
page read and write
|
||
8D0000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
E20000
|
unkown
|
page read and write
|
||
1CA000
|
unkown
|
page execute and read and write
|
||
3F6000
|
unkown
|
page read and write
|
||
5428000
|
unkown
|
page read and write
|
||
5419000
|
unkown
|
page read and write
|
||
4A00000
|
unkown
|
page execute and read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
203000
|
unkown
|
page read and write
|
||
42C0000
|
unkown
|
page execute and read and write
|
||
197000
|
unkown
|
page execute and read and write
|
||
450000
|
heap default
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
697E000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
258F000
|
unkown
|
page read and write
|
||
590000
|
unkown
|
page read and write
|
||
2D0E000
|
unkown
|
page read and write
|
||
1D7000
|
unkown
|
page execute and read and write
|
||
3A5000
|
unkown
|
page read and write
|
||
666000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
E05000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
C2D000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page read and write
|
||
490000
|
heap default
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
B0000
|
unkown
|
page read and write
|
||
2FE9000
|
unkown
|
page read and write
|
There are 564 hidden memdumps, click here to show them.